Skip to content

Commit c41b34d

Browse files
defguard-communitygitbook-bot
authored andcommitted
GITBOOK-143: change request with no subject merged in GitBook
1 parent 4cccea7 commit c41b34d

File tree

1 file changed

+21
-5
lines changed

1 file changed

+21
-5
lines changed

features/yubikey-provisioning.md

+21-5
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,27 @@ description: https://github.com/DefGuard/YubiKey-Provision
66

77
## Overview
88

9-
Our provisioning client allows you to easily populate the OpenPGP application on a YubiKey, and share its public information inside Defguard.
9+
Our provisioning service (installed on a computer that has USB access and securely communicating with defguard) allows you to easily create and populate the **SSH and GPG/OpenPGP** keys on a YubiKey hardware key, and share its public information inside defguard - which can be [used for example to authenticate to servers using defguard](ssh-authentication.md).
1010

11-
It's completely safe, we are not storing private keys. Every key is provisioned inside an encapsulated session so any gpg related files are deleted right after the process ends successfully or not. Only public PGP and SSH keys are sent to Defguard so you can access them at any time.
11+
It's completely safe, defguard does not store private keys. Every key is provisioned inside an encapsulated session so any **gpg-related files are deleted right after the process ends successfully or not**. Only public PGP and SSH keys are sent to defguard so you can access them at any time.
1212

13-
## Installation
13+
{% hint style="warning" %}
14+
**GPG keys warning!**
15+
16+
17+
18+
That also means that the **master key** is deleted and only sub-keys are stored - so you will not be able for example to edit the GPG key and add additional emails, etc - as that requires the **master key** to be imported to GPG.
19+
20+
As we do not want to store any private keys for security reasons, we have some ideas and plans for **optional master-key** storage based on **HSM encryption**, but we want to see if any actual companies/users need that, as there is always a way just to overwrite the existing YK and provision with new data. 
21+
{% endhint %}
22+
23+
## Installation of provisioning service
24+
25+
{% hint style="info" %}
26+
The provisioning service is required as we need physical access to the USB and to the YK device.
27+
28+
It's good for example to prepare a _provisioning station_ in your organization that will be available for just plugging in new YK's and provisioning them with ease..
29+
{% endhint %}
1430

1531
Currently, we provide Linux .rpm and .deb packages alongside Docker image, but provisioning clients can also be compiled and run under Windows and MacOS.
1632

@@ -51,7 +67,7 @@ To register a new provisioning client you will need an access token provided by
5167
This path describes how the admin can provision a key for a user, but the same provisioning modal is also available to the users on the user profile if any workers are available on the instance.
5268
{% endhint %}
5369

54-
You can see available clients in Defguard web-application under "provisioners" tab.
70+
web applicationYou can see available clients in Defguard web-application under "provisioners" tab.
5571

5672
<figure><img src="../.gitbook/assets/image (8) (1).png" alt=""><figcaption></figcaption></figure>
5773

@@ -79,7 +95,7 @@ If the client will not detect your YubiKey, it may work if you unplug and plug i
7995

8096
#### Provisioning failed / IO Error in logs
8197

82-
This is very similar to Yubikey not detected issue. If run under VM with no direct access to host USB devices, the provisioner or rather gpg program itself can have trouble with sending proper commands to YubiKey smartcard. In this case, ensure that gpg can access the smartcard and write into it from VM without problems, for testing this, follow this [guide](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) from yubico.
98+
This is very similar to Yubikey not detected issue. If run under VM with no direct access to host USB devices, the provisioner or rather gpg program itself can have trouble with sending proper commands to YubiKey smartcard. In this case, ensure that gpg can access the smartcard and write into it from VM without problems, for testing this, follow this [guide](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) from Yubico.
8399

84100
#### Failed to register worker
85101

0 commit comments

Comments
 (0)